Wei Yan

According to our database1, Wei Yan
  • authored at least 148 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Recovery behaviors in n-channel LTPS-TFTs under DC stress.
Microelectronics Reliability, 2018

2017
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions.
IEEE Trans. Mob. Comput., 2017

A novel regularized concept factorization for document clustering.
Knowl.-Based Syst., 2017

A novel bi-subgroup adaptive evolutionary algorithm for optimizing degree of hybridization of HEV bus.
Cluster Computing, 2017

The motor vector control system based on BP-PI regulator.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

Optimization and simulation of satellite IMS access gateway and signal's propagation dela.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

Robust semi-supervised concept factorization.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Trajectory-Matching Prediction for Friend Recommendation in Anonymous Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Risk assessment for oil&gas resource countries based on PCA-SVM model.
Proceedings of the 20th International Conference on Information Fusion, 2017

Detecting Java Code Clones with Multi-granularities Based on Bytecode.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical Data.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Analysis of Magnetoencephalography based on symbolic transfer entropy.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Face recognition based on convolution siamese networks.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

A method to speed up VLSI hierarchical physical design in floorplanning.
Proceedings of the 12th IEEE International Conference on ASIC, 2017

2016
Theoretical analysis on caching effects in urban vehicular ad hoc networks.
Wireless Communications and Mobile Computing, 2016

A Mixed Integer Programming Model for Supplier Selection and Order Allocation Problem with Fuzzy Multiobjective.
Scientific Programming, 2016

A fast recognition algorithm for suspicious behavior in high definition videos.
Multimedia Syst., 2016

A robust HLLC-type Riemann solver for strong shock.
J. Comput. Physics, 2016

A Decision-making Method for Active Remanufacturing Time Based on Environmental and Economic Indicators.
iJOE, 2016

A new approach for the capability analysis based on measurement system analysis: a case study for coal quality detection equipment.
IJADS, 2016

A Fast Non-Smooth Nonnegative Matrix Factorization for Learning Sparse Representation.
IEEE Access, 2016

Quantifying caching effects in urban VANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A Link Reliability Model of Metropolitan VANETs for Data Dissemination.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Trident: Context-Based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

An Optimization Algorithm for Heterogeneous Hadoop Clusters Based on Dynamic Load Balancing.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Optimal Scheduling Algorithm of MapReduce Tasks Based on QoS in the Hybrid Cloud.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

The Optimization of LRU Algorithm Based on Pre-Selection and Cache Prefetching of Files in Hybrid Cloud.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

2015
Boosting named data networking for data dissemination in urban VANET scenarios.
Vehicular Communications, 2015

On the Security of Compressed Sensing-Based Signal Cryptosystem.
IEEE Trans. Emerging Topics Comput., 2015

A connectivity resilient dynamic multi-channel assignment method for VANET.
Security and Communication Networks, 2015

Finger-vein recognition with modified binary tree model.
Neural Computing and Applications, 2015

Effect of Outdated Channel Estimates on Multiple Antennas Multiple Relaying Networks.
TIIS, 2015

Finger-vein pattern restoration with Direction-Variance-Boundary Constraint Search.
Eng. Appl. of AI, 2015

Investigation on remote monitoring system for hybrid electric bulldozer.
Comput. Syst. Sci. Eng., 2015

A fast genetic algorithm for solving architectural design optimization problems.
AI EDAM, 2015

Boosting named data networking for efficient packet forwarding in urban VANET scenarios.
Proceedings of the 2015 IEEE International Workshop on Local and Metropolitan Area Networks, 2015

Auction model for mass customization of logistics.
Proceedings of the IEEE First International Smart Cities Conference, 2015

A two-year survey on security challenges in automotive threat landscape.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Pilot-bus-centered automatic voltage control with high penetration level of wind generation.
Proceedings of the 2015 IEEE Industry Applications Society Annual Meeting, 2015

The Hidden Fine-Grained State Machine in Cellular Network for Simultaneous Voice and Data Services.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Coordinated Resource Management for Large Scale Interactive Data Query Systems.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
A robust and contact resolving Riemann solver on unstructured mesh, Part II, ALE method.
J. Comput. Physics, 2014

A robust and contact resolving Riemann solver on unstructured mesh, Part I, Euler method.
J. Comput. Physics, 2014

FKG.js: A Plug-in Based on Freebase for a Knowledge Card Service.
Proceedings of the 2014 10th International Conference on Semantics, 2014

Simulation and Evaluation of Decentralized SPARQL Query Processing.
Proceedings of the International Conference on Identification, 2014

DA2RF: A data aggregation algorithm by restricting forwarders for VANETs.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Sober-Drive: A smartphone-assisted drowsy driving detection system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

A modification on the Chord finger table for improving search efficiency.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

Simulation of a Semantic Web data sharing system based on NS-3.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
An Algorithm for Vein Matching Based on Log-polar Transform.
Smart CR, 2013

Finger Vein Representation by Modified Binary Tree Model.
Smart CR, 2013

Sitting and sizing of aggregator controlled park for plug-in hybrid electric vehicle based on particle swarm optimization.
Neural Computing and Applications, 2013

An Algorithm for smoke RoF Detection Based on Surveillance Video.
Journal of Circuits, Systems, and Computers, 2013

GAMLL: Gateway Assisted Multicast Algorithm Towards Low Latency for Wireless Mesh Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

On the cascading spectrum contention problem in self-coexistence of cognitive radio networks.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

Scalable load balancing for mapreduce-based record linkage.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Queue reorganization for subscription congestion avoidance in publish/subscribe systems.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Is Environmental Innovation Worth It? The Case of the Civil Aviation Industry of Emerging Markets.
Proceedings of the Advances in Production Management Systems. Sustainable Production and Service Supply Chains, 2013

Word of Mouth in Hospitality Management: The Case of Luxury Hotels in China.
Proceedings of the Advances in Production Management Systems. Sustainable Production and Service Supply Chains, 2013

Queue Reorganization for Subscription Congestion Avoidance in Publish/Subscribe Systems.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET.
Proceedings of the Frontiers in Internet Technologies, 2013

TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications.
Proceedings of the Frontiers in Internet Technologies, 2013

A road based multi-channel assignment method for VANET.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

LCS-MANET: A mobile storage architecture with location centric storage algorithm in manets.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Rate adaptation based on inherent frame delivery ratio for wireless networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Scalable and robust key group size estimation for reducer load balancing in MapReduce.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

2012
Ionospheric Electron Concentration Imaging Using Combination of LEO Satellite Data With Ground-Based GPS Observations Over China.
IEEE Trans. Geoscience and Remote Sensing, 2012

NCSWT: An integrated modeling and simulation tool for networked control systems.
Simulation Modelling Practice and Theory, 2012

Anti-virus in-the-cloud service: are we ready for the security evolution?
Security and Communication Networks, 2012

Driver's Face Detection Using Space-time Restrained Adaboost Method.
TIIS, 2012

Continuous-time safety-first portfolio selection with jump-diffusion processes.
Int. J. Systems Science, 2012

A class of multi-period semi-variance portfolio for petroleum exploration and development.
Int. J. Systems Science, 2012

Continuous-time mean-variance portfolio selection with value-at-risk and no-shorting constraints.
Int. J. Control, 2012

A method for evaluating environmental performance of machining systems.
Int. J. Computer Integrated Manufacturing, 2012

Modeling of Electromagnetic Interference Noise Mechanism for Magneto-Rheological Damper.
Proceedings of the Intelligent Robotics and Applications - 5th International Conference, 2012

CAS: A framework of online detecting advance malware families for cloud-based security.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Integrated simulation and emulation platform for cyber-physical system security experimentation.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

SENTINEL: securing database from logic flaws in web applications.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Modeling of Dimmable Fluorescent Lamp Including the Tube Temperature Effects.
IEEE Trans. Industrial Electronics, 2011

Evolving robust GP solutions for hedge fund stock selection in emerging markets.
Soft Comput., 2011

Special issue on Bio-inspired Learning and Intelligent Systems for Security (BLISS-07).
Soft Comput., 2011

The Cauchy problem for the modified Kawahara equation in Sobolev spaces with low regularity.
Mathematical and Computer Modelling, 2011

Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction.
J. Network and Computer Applications, 2011

A Fast and Robust Algorithm for Fighting Behavior Detection Based on Motion Vectors.
TIIS, 2011

Automated Ranking of Relaxing Query Results Based on XML Structure and Content Preferences.
IJSSOE, 2011

Curve fitting and optimal interpolation on CNC machines based on quadratic B-splines.
SCIENCE CHINA Information Sciences, 2011

Quantitative Analysis of the VANET Connectivity: Theory and Application.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Power Allocation for Bidirectional AF Relaying with Direct Link over Rayleigh Fading Environment.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Relative Link Quality Assessment and Hybrid Routing Scheme for Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2011

The automatic detection of artifacts in Magnetoencephalographic signals based on fast ICA.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

VM Co-scheduling: Approximation of Optimal Co-scheduling in Data Center.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Behavior of viscous solutions in Lagrangian formulation.
J. Comput. Physics, 2010

Numerical solution of continuous-time mean-variance portfolio selection with nonlinear constraints.
Int. J. Control, 2010

Reliable Multicast with Network Coding in Lossy Wireless Networks.
IJCNS, 2010

Relaxing Queries Based on XML Structure and Content Preferences.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

MI-VANET: A New Mobile Infrastructure Based VANET Architecture for Urban Environment.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Research on Reverse Engineering from Formal Models to UML Models.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

Algorithms for Random Adjacency Matrixes Generation Used for Scheduling Algorithms Test.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Cross-layer optimal policies for stochastic reliable transmission in Wireless Sensor Networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

Generalized synchronization control of discrete-time chaotic systems.
Proceedings of the Sixth International Conference on Natural Computation, 2010

The Optimized Reinforcement Learning Approach to Run-Time Scheduling in Data Center.
Proceedings of the GCC 2010, 2010

A Hybrid Modeling Approach to Microarchitecture Design Space Exploring.
Proceedings of the GCC 2010, 2010

Registration and Private Key Distribution Protocol Based on IBE.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Reconstructing the Music Hall Rotunda and Annex at Vauxhall Pleasure Gardens c. 1764.
Proceedings of the Electronic Visualisation and the Arts, 2010

2009
Metrics and Algorithms for Scheduling of Data Dissemination in Mesh Units Assisted Vehicular Networks.
Wireless Sensor Network, 2009

Energy Saving of Large-Scale High-Intensity-Discharge Lamp Lighting Networks Using a Central Reactive Power Control System.
IEEE Trans. Industrial Electronics, 2009

Research on Real-Time Mobile 3D Topography System.
JNW, 2009

Futures price modeling under exchange rate volatility and its multi-period semi-variance portfolio selection.
Int. J. Systems Science, 2009

A class of continuous-time portfolio selection with liability under jump-diffusion processes.
Int. J. Control, 2009

Evaluation of two-dimensional ZK-MEW equation using the Exp-function method.
Computers & Mathematics with Applications, 2009

Prequips - an extensible software platform for integration, visualization and analysis of LC-MS/MS proteomics data.
Bioinformatics, 2009

An Opportunistic Approach to Enhance the Geo-graphical Source Routing Protocol for Vehicular Ad hoc Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Identification and Authentication in Large-Scale Storage Systems.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Why Anti-Virus Products Slow Down Your Machine?
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Cast Shadow Removal Using Time and Exposure Varying Images.
Proceedings of the Seventh International Conference on Advances in Pattern Recognition, 2009

Behavioural GP diversity for adaptive stock selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Efficient event-based resource discovery.
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, 2009

Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing.
Proceedings of the Complex Sciences, 2009

2008
Revealing Packed Malware.
IEEE Security & Privacy, 2008

A class of portfolio selection with a four-factor futures price model.
Annals OR, 2008

ASCSS: An Automatic Service Composition Approach Based on Service Similarity.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

Learning to optimize profits beats predicting returns -: comparing techniques for financial portfolio optimisation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Ultra high frequency financial data.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
Comparison of Dimmable Electromagnetic and Electronic Ballast Systems - An Assessment on Energy Efficiency and Lifetime.
IEEE Trans. Industrial Electronics, 2007

Multi-period semi-variance portfolio selection: Model and numerical solution.
Applied Mathematics and Computation, 2007

An analytical flow control scheme for real-time traffic in wireless mesh network: from theoretic model to practical mechanism.
Proceedings of the 4th International Conference on Mobile Technology, 2007

A Clustering-Based Channel Assignment Algorithm and Routing Metric for Multi-channel Wireless Mesh Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

MEMO: An Applied Wireless Mesh Network with Client Support and Mobility Management.
Proceedings of the Global Communications Conference, 2007

Evolving robust GP solutions for hedge fund stock selection in emerging markets.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Diverse committees vote for dependable profits.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Model Checking of Computer-Based Systems.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

A Logic for Flow Event Structures.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Description logics for an autonomic IDS event analysis system.
Computer Communications, 2006

Integrating web 2D and 3D technologies for architectural visualization: applications of SVG and X3D/VRML in environmental behavior simulation.
Proceedings of the Proceeding of the Eleventh International Conference on 3D Web Technology, 2006

Wireless Multi-hop Network Scenario Emulation with MinMax Error.
Proceedings of the LCN 2006, 2006

Behavioural GP diversity for dynamic environments: an application in hedge fund investment.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

2005
Network Attack Scenarios Extraction and Categorization by Mining IDS Alert Streams.
J. UCS, 2005

Learning the Behavior of Users in a Public Space through Video Tracking.
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005

GCMPR: Gateway-Centric Multi-path Routing for Internet Connectivity of Wireless Mobile Ad Hoc Network.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Frame-based attack representation and real-time first order logic automatic reasoning.
Proceedings of the ITRE 2005, 2005

Cross-Layer Flow Control Based on Path Capacity Prediction for Multi-hop Ad Hoc Network.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Anycast Extensions to OSPFv3.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks.
Proceedings of IEEE International Conference on Communications, 2005

Measuring the Histogram Feature Vector for Anomaly Network Traffic.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Rehabilitation Guidance System using Multi-Layer Feed-Forward Neural Networks.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005

2003
Numerical schemes for Hamilton-Jacobi equations on unstructured meshes.
Numerische Mathematik, 2003

A Formal Specification and Method for MAS as a Distributed System.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...